1. Application layer firewalls works on the application level of the ____stack (i.e.all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application:
a) TCP
b) IP
c) Both of Above
d) OFC
d) None of These
2. From 1989 -1990 three colleagues from AT & T Bell Laboratories, Dave Presotto,Janardan Sharma and Kshitij Nigam developed the second generation of firewalls, calling them:
a) Circuit Level Gateway
b) Application Layer
c) Proxies
d) VPN
e) None of These
3. The first type of firewall was the packet filter which looks at:
a) Network addresses
b) Ports of the packet and determines if that packet should be allowed or blocked
c) Both of above
d) Router
d) None of These
4. ____intercepts all messages entering and leaving the network. The _____effectively hides the true network addresses:
a) Circuit Level Gateway
b) Proxy Server
c) Packet Filter
d) Payment Gateway
e) None of These
5. A firewall is a network security system ______based that controls incoming and outgoing network traffic based on a set of rules:
a) Hardware
b) Software
c) Both hardware or software
d) Virus
e) None of These
6. INTER POL stands for:
a) International Police
b) Internal Polythims
c) Internet Protocol
d) None of These
e) Internet pools
7. MOD refers to:
a) Monitor of Deception
b) Master of Deception
c) Management of Deception
d) Management of Decision
e) None of These
8. IRC stands for:
a) Internet Relay Chat
b) Internal Rely Chat
c) Information Relay Chat
d) Intelligent Relay chat
e) None of These
9. Which among the following are Malicious Software’s:
a) Virus and Worms
b) Trojan Horse and Time Bomb
c) Logic Bomband Rabbit and Bacterium
d) None of These
e) All of the Above
10. Credit Card Fraud includes:
a) Credit cards are illegally get and used to get movable or immovable property
b) Unauthorized and illegal use of credit cards
c) Both of Above
d) Payment Gateway
e) None of These
SOLUTION
1-c 2-a 3-c 4-B 5-C 6-a 7-B 8-a 9-e 10-C
0 comments:
Post a Comment
MAHENDRA GURU